网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()
A
Hub
B
Bridge
C
Switch
D
Router
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A HubB BridgeC SwitchD Router” 相关考题
考题
Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()
A.HubB.VLANC.RouterD.Server
考题
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router
考题
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()
A. Caching enginesB. QoSC. Traffic shapingD. Load balancing
考题
Which of the following technologies allows an administrator to submit traffic to an IDS for review?()
A. Spanning treeB. VLANC. PoED. Port mirroring
考题
An administrator is troubleshooting a communication issue between two computers on the sameLayer 2 switch.Which of the following is the BEST way to determine if the switch is causing the issue?()
A. Setup an ACL that allows and logs all IP traffic between the two computersB. Configure a spanning tree to check for a loopC. Setup a span port on the switch to watch for CRC errorsD. Connect both computers using a crossover cable
考题
The following exhibit displays the NetFlow statistics for a CIS router, which will be helpful for a network administrator to collect IP traffic information.Which two numbers separately refer to the percentage of packets sized between 32 and 64 bytes and the number of flows in progress?()A. 24.9%, 980B. 6.94%, 980C. 69.4%, 35D. cannot be determined from this outputE. 69.4%, 4061
考题
Refer to the exhibit.The network administrator requires easy configuration options and minimal routing protocol traffic.Which two options provide adequate routing table information for traffic that passes between the two routers and satisfy the requests of the network administrator?()A.a dynamic routing procotol on InternetRouter to advertise summarized routers to CentralRouter.B.a dynamic routing procotol on CentralRouter to advertise summarized routers to InternetRouter.C.a static route on InternetRouter to direct traffic that is destined for 172.16.0.0/16 to CentralRouter.D.a dynamic routing procotol on InternetRouter to advertise all routes to CentralRouer.E.a dynamic routing procotol on CentralRouer to advertise all routes to InternetRouterF.a static,default route on CentralRouter that directs traffic to InternetRouter.
考题
What are two reasons that a network administrator would use access lists (Choose two.)()。
A.to control vty access into a routerB.to control broadcast traffic through a routerC.to filter traffic as it passes through a routerD.to filter traffic that originates from the routerE.to replace passwords as a line of defense against security incursions
考题
What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions
考题
An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A、Setup an ACL that allows and logs all IP traffic between the two computersB、Configure a spanning tree to check for a loopC、Setup a span port on the switch to watch for CRC errorsD、Connect both computers using a crossover cable
考题
An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()A、Setting up a custom community nameB、Configuring the network to block traffic on port 161C、Configuring the Windows Firewall to block port 161D、Setting SNMP to read only on the devicesE、Installing new MIBs
考题
A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()A、The administrator should monitor all traffic between the staff member and the server.B、The administrator should reconfigure the RAID configuration to allow more space.C、The administrator should map a drive using the net use command.D、The administrator should allow the staff member to use a USB drive.
考题
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router
考题
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing
考题
Which of the following technologies allows an administrator to submit traffic to an IDS for review?()A、Spanning treeB、VLANC、PoED、Port mirroring
考题
Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()A、HubB、VLANC、RouterD、Server
考题
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
考题
单选题The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A
nGenius Real-Time MonitorB
CiscoViewC
Device Fault ManagerD
Internetwork Performance Monitor
考题
多选题An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()ASetting up a custom community nameBConfiguring the network to block traffic on port 161CConfiguring the Windows Firewall to block port 161DSetting SNMP to read only on the devicesEInstalling new MIBs
考题
单选题Which of the following devices should an administrator connect to a protocol analyzer in order tocollect all of the traffic on a LAN segment?()A
HubB
VLANC
RouterD
Server
考题
单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A
AB
BC
CD
D
考题
单选题A staff member reports that they cannot access the shared folder on the network; however, other staff members are reporting that they can access the shared folder. Which of the following is the BEST way to identify the problem?()A
The administrator should monitor all traffic between the staff member and the server.B
The administrator should reconfigure the RAID configuration to allow more space.C
The administrator should map a drive using the net use command.D
The administrator should allow the staff member to use a USB drive.
考题
单选题A system administrator is monitoring a system that has recently shown a decrease in performance. The administrator suspects there is an overload of traffic on a single Ethernet adapter. Which of the following commands is best to identify a possible overload of the Ethernet adapter?()A
pingB
iostatC
netstatD
ifconfig
考题
单选题You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet.You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: (1)Detect and identify traffic that is sent by the worm. (2)Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A
Configure a WMI event trigger.B
Configure a Network Monitor capture filter.C
Configure a Network Monitor trigger.D
Configure a System Monitor alert.
考题
单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A
HubB
BridgeC
SwitchD
Router
考题
单选题An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A
Setup an ACL that allows and logs all IP traffic between the two computersB
Configure a spanning tree to check for a loopC
Setup a span port on the switch to watch for CRC errorsD
Connect both computers using a crossover cable
考题
单选题Which of the following technologies allows an administrator to submit traffic to an IDS for review?()A
Spanning treeB
VLANC
PoED
Port mirroring
热门标签
最新试卷